{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T05:36:58.285","vulnerabilities":[{"cve":{"id":"CVE-2024-13959","sourceIdentifier":"security@nortonlifelock.com","published":"2025-05-09T16:15:23.360","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Link Following Local Privilege Escalation Vulnerability in TuneupSvc.exe in AVG TuneUp 24.2.16593.9844 on Windows allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging the service to delete a directory"},{"lang":"es","value":"La vulnerabilidad de escalada de privilegios locales mediante seguimiento de enlaces en TuneupSvc.exe en AVG TuneUp 24.2.16593.9844 en Windows permite a atacantes locales escalar privilegios y ejecutar código arbitrario en el contexto del SYSTEM mediante la creación de un enlace simbólico y el uso del servicio para eliminar un directorio."}],"metrics":{"cvssMetricV31":[{"source":"security@nortonlifelock.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@nortonlifelock.com","type":"Secondary","description":[{"lang":"en","value":"CWE-59"}]}],"references":[{"url":"https://www.gendigital.com/us/en/contact-us/security-advisories/","source":"security@nortonlifelock.com"}]}}]}